class “org.bouncycastle.asn1.ASN1Integer“‘s signer information does not match signer information of

项目启动的时候提示“class “org.bouncycastle.asn1.ASN1Integer”'s signer information does not match signer information of other classes in the same package”
意思是提示的类没有唯一的对应类,这个时候需要看下自己是不是重复引入了,注意:不一定是自己直接引入的,极有可能是自己依赖的二方包里边引入了和自己一样的三方包,这个时候maven的conflicts还不能直接体现出来,可以再dependencies tree里边搜索都哪里引入了提示类,然后exclude掉自己不需要的就ok了。
exclude掉之后,重新reimport一下,即可发现没有重复依赖,这个时候重新启动应该就ok了。

  • 2
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 2
    评论
以下是一个使用Java语言解析SM2 ASN1格式数字信封的示例代码: ```java import org.bouncycastle.asn1.ASN1InputStream; import org.bouncycastle.asn1.ASN1Integer; import org.bouncycastle.asn1.ASN1ObjectIdentifier; import org.bouncycastle.asn1.ASN1Primitive; import org.bouncycastle.asn1.DERBitString; import org.bouncycastle.asn1.DERSequence; import org.bouncycastle.asn1.DERTaggedObject; import org.bouncycastle.asn1.pkcs.PrivateKeyInfo; import org.bouncycastle.asn1.x509.AlgorithmIdentifier; import org.bouncycastle.crypto.engines.SM2Engine; import org.bouncycastle.crypto.params.AsymmetricKeyParameter; import org.bouncycastle.crypto.params.ECPrivateKeyParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.signers.SM2Signer; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.encoders.Hex; import java.io.ByteArrayInputStream; import java.security.KeyFactory; import java.security.PrivateKey; import java.security.PublicKey; import java.security.Security; import java.security.cert.CertificateFactory; import java.security.cert.X509Certificate; import java.security.spec.ECPrivateKeySpec; import java.security.spec.ECPublicKeySpec; import java.security.spec.PKCS8EncodedKeySpec; public class SM2ASN1Decoder { static { Security.addProvider(new BouncyCastleProvider()); } public static void main(String[] args) throws Exception { // SM2 ASN1格式数字信封 String sm2Envelope = "30819E300D06092A864886F70D010101050003818B003081870201013082" + "820206092A864886F70D010706A082820F3082820B020101310B30090607" + "2A8648CE3D020106082A811CCF5501822D0479304402206E7A107FBEE4D" + "7E6D5D49CB2A2562D60A3220E3B9C2B0D9BF5B2B7B8FAC9F9022042B00" + "C7F8E1B2898D4C6E68F2F04A1B8E7D86CD3ECB5A79A5D0034B3C9C5F10" + "A081806C30818006072A8648CE3D020106052B8104000A03420004B7E0" + "B2A6BB1C6E6D4D4A3C1F5B5B6172C80280C3E5A23E4A2B5F58CDB259B0" + "FBB8323F4D12A4E8686D4FAC53B5F267F3A5C64BCD0E8F1A3D00EA0EED" + "A1E2F9A1A281E43081E1020103302C301306072A8648CE3D020106082A" + "811CCF5501822D0479304402206E7A107FBEE4D7E6D5D49CB2A2562D60" + "A3220E3B9C2B0D9BF5B2B7B8FAC9F9022042B00C7F8E1B2898D4C6E68" + "F2F04A1B8E7D86CD3ECB5A79A5D0034B3C9C5F1"; // 解码ASN1结构体 ASN1InputStream input = new ASN1InputStream(new ByteArrayInputStream(Hex.decode(sm2Envelope))); ASN1Primitive asn1 = input.readObject(); // 获取加密算法标识 ASN1Sequence envelope = (ASN1Sequence) asn1; ASN1Sequence header = (ASN1Sequence) envelope.getObjectAt(0); ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier) header.getObjectAt(0); String algorithm = oid.getId(); // 获取摘要算法标识 ASN1Sequence contentInfo = (ASN1Sequence) envelope.getObjectAt(1); ASN1Sequence digestAlg = (ASN1Sequence) contentInfo.getObjectAt(1); ASN1ObjectIdentifier digestOid = (ASN1ObjectIdentifier) digestAlg.getObjectAt(0); String digestAlgorithm = digestOid.getId(); // 获取加密数据 ASN1Sequence encapContentInfo = (ASN1Sequence) contentInfo.getObjectAt(2); ASN1ObjectIdentifier encapOid = (ASN1ObjectIdentifier) encapContentInfo.getObjectAt(0); String encapAlgorithm = encapOid.getId(); DERBitString encryptedData = (DERBitString) encapContentInfo.getObjectAt(1); byte[] encrypted = encryptedData.getOctets(); // 获取数字签名 DERTaggedObject signerInfos = (DERTaggedObject) envelope.getObjectAt(2); ASN1Sequence signedData = (ASN1Sequence) signerInfos.getObject().toASN1Primitive(); ASN1Sequence signerInfo = (ASN1Sequence) signedData.getObjectAt(0); ASN1Sequence digestAlgId = (ASN1Sequence) signerInfo.getObjectAt(1); ASN1ObjectIdentifier digestAlgOid = (ASN1ObjectIdentifier) digestAlgId.getObjectAt(0); String signerDigestAlgorithm = digestAlgOid.getId(); DERBitString signature = (DERBitString) signerInfo.getObjectAt(3); byte[] sign = signature.getOctets(); // 获取签名证书 ASN1Sequence certificateSet = (ASN1Sequence) signedData.getObjectAt(1); ASN1Sequence certificateSeq = (ASN1Sequence) certificateSet.getObjectAt(0); byte[] certificateBytes = certificateSeq.getEncoded(); CertificateFactory cf = CertificateFactory.getInstance("X.509"); X509Certificate certificate = (X509Certificate) cf.generateCertificate(new ByteArrayInputStream(certificateBytes)); PublicKey publicKey = certificate.getPublicKey(); // 对加密数据进行解密 KeyFactory keyFactory = KeyFactory.getInstance("EC", "BC"); byte[] priKeyBytes = // TODO: 获取私钥字节数组 PKCS8EncodedKeySpec priKeySpec = new PKCS8EncodedKeySpec(priKeyBytes); PrivateKey privateKey = keyFactory.generatePrivate(priKeySpec); AsymmetricKeyParameter privateKeyParameter = new ECPrivateKeyParameters(((ECPrivateKey) privateKey).getS(), ((ECPrivateKey) privateKey).getParams()); AsymmetricKeyParameter publicKeyParameter = new ECPublicKeyParameters(((ECPublicKey) publicKey).getQ(), ((ECPublicKey) publicKey).getParams()); SM2Engine engine = new SM2Engine(); engine.init(false, privateKeyParameter); byte[] decrypted = engine.processBlock(encrypted, 0, encrypted.length); // 对解密后的明文数据进行摘要 AlgorithmIdentifier algorithmIdentifier = new AlgorithmIdentifier(new ASN1ObjectIdentifier(digestAlgorithm)); byte[] digest = MessageDigest.getInstance(digestAlgorithm).digest(decrypted); // 使用公钥对数字签名进行验证 SM2Signer signer = new SM2Signer(); signer.init(false, publicKeyParameter); signer.update(digest, 0, digest.length); boolean verifyResult = signer.verifySignature(sign); if (verifyResult) { System.out.println("数字签名验证成功"); System.out.println("解密后的明文数据:" + Hex.toHexString(decrypted)); } else { System.out.println("数字签名验证失败"); } } } ``` 需要注意的是,上述代码中的私钥字节数组、摘要算法和加密算法等信息需要根据具体情况进行修改和替换。同时,在实际应用中,还需要考虑异常处理、安全性等方面的问题。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值